Re: kpop?

2001-10-05 Thread Russ Allbery
entries for /etc/services (kpop 1109/tcp) and inetd.conf on the mail server but can't find the kpop binary (or source) anywhere. We're using kerberos5-1.2.1 The qualcomm popper supports kpop (if you build it against kerb libs). Cyrus also supports KPOP. -- Russ Allbery ([EMAIL PROTECTED

Re: login.krb5 not accepting root password

2002-03-16 Thread Russ Allbery
slackware 8 with MIT kerberos 1.2.3. Does anyone have an idea ? I don't believe login.krb5 supports MD5 passwords. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] http

Re: login.krb5 not accepting root password

2002-03-17 Thread Russ Allbery
. On Linux, a Kerberos PAM module is usually a better idea. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] http://mailman.mit.edu/mailman/listinfo/kerberos

Re: .__eprintf in libgssapi_krb5.a

2002-05-17 Thread Russ Allbery
as frequently. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] http://mailman.mit.edu/mailman/listinfo/kerberos

Re: keytab

2002-07-09 Thread Russ Allbery
are mostly site-specific; drop me a line in e-mail and let me know what you're doing and I can probably find a good solution for you. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL

Re: LDAP/Kerberos user management

2002-08-26 Thread Russ Allbery
in a single homogenous file system. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] http://mailman.mit.edu/mailman/listinfo/kerberos

Re: LDAP/Kerberos user management

2002-08-27 Thread Russ Allbery
(and OpenAFS is superior in most respects at this point anyway). If you want an encrypted FS you can use Sun's SEAM (SecNFS) which is KRB5 based. Or wait for NFSv4 You can get network encryption with AFS. It's just not really anything to write home about yet, and it's not on by default. -- Russ

Re: LDAP/Kerberos user management

2002-09-04 Thread Russ Allbery
. I'm not sure what you're comparing here, since neither of those environments sound anything like AFS. They sound like two different ways to configure NFS, neither of which scale anywhere like the way that AFS scales. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Purpose of Server Public/Private Key??

2003-07-10 Thread Russ Allbery
is that Kerberos isn't designed solely to authenticate a user to a single service, but instead to provide the user with a set of credentials which can then be used to authenticate to *any* Kerberos service without requiring further authentication events in the client? -- Russ Allbery ([EMAIL

Re: using Kerberos to detect duplicate packets?

2003-09-16 Thread Russ Allbery
a particular networking issue? If so, the answer is probably not, or at least it wouldn't be the most natural way of doing so. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED

Re: Download of Kerberos Binaries

2003-09-16 Thread Russ Allbery
easier, even for people inside the US. (The folks at crypto-publish.org have filed the required paperwork with the US government to make available cryptographic software in source format, and MIT has been reluctant to do that for legal reasons.) -- Russ Allbery ([EMAIL PROTECTED]) http

Re: MIT kerberos download problems

2003-10-01 Thread Russ Allbery
pacifican [EMAIL PROTECTED] writes: I am located in the USA, (California) and don't have a clue as to how to get the download site to believe that I am. Anyone have a suggestion? Download Kerberos from http://www.crypto-publish.org/. It doesn't have the country restrictions. -- Russ Allbery

Re: [Qustion]ticket forwarding problem....help!!!!!!

2003-10-21 Thread Russ Allbery
kcmd: Error getting forwarded creds klist -f will show what flags are set on your tickets. My guess is that you haven't obtained a forwardable ticket; in other words, the F flag won't appear next to the ticket. To obtain a forwardable ticket, use kinit -f. -- Russ Allbery ([EMAIL PROTECTED

Re: kdc slowness recently - delayed login authentication

2003-11-13 Thread Russ Allbery
. Anyway, we've had intermittant hardware problems with one of our Kerberos servers that should now be fixed; if you rsystem was configured to look at it first for some reason, that would be the problem. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: question..

2003-11-15 Thread Russ Allbery
to download Kerberos v5 instead. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos

Re: make check failed

2003-11-19 Thread Russ Allbery
install tcsh -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos

Re: pls send me the answer for this question

2004-01-15 Thread Russ Allbery
confidentiality, but essentially all Kerberos-enabled applications can negotiate a privacy layer at the same time. Usually Kerberos is used via an authentication and confidentiality negotiation protocol such as GSSAPI or SASL which includes a way of negotiating a privacy layer. -- Russ Allbery ([EMAIL

Re: Kerberos vs. LDAP for authentication -- any opinions?

2004-01-28 Thread Russ Allbery
forwarding, etc.) in favor of something that's basically secure NIS. If secure NIS is something you're happy with, hey, great, but to me it feels like 1980s security technology, long-since obsolete. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Principal for service

2004-02-10 Thread Russ Allbery
with MIT tries ftp/hostname.example.com and then falls back on host/hostname.example.com if the former doesn't exist. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] https

Re: Principal for service

2004-02-11 Thread Russ Allbery
Ken Raeburn [EMAIL PROTECTED] writes: On Tuesday, Feb 10, 2004, at 21:48 US/Eastern, Russ Allbery wrote: It depends entirely on what your ftp server and client are using to do authentication. It looks like the version that comes with MIT tries ftp/hostname.example.com and then falls back

Re: WebISO: the killer kerberos app?

2004-03-04 Thread Russ Allbery
the stored TGT to obtain a service ticket for the new web application. This is exactly the design of Stanford's WebAuth v3. :) See: http://webauthv3.stanford.edu/ -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: WebISO: the killer kerberos app?

2004-03-05 Thread Russ Allbery
wrote many years ago), but none of them could meet all of our requirements (in particular, we hope to make extensive use of proxy authentication down the road). -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos

Re: WebISO: the killer kerberos app?

2004-03-05 Thread Russ Allbery
Christopher Kranz [EMAIL PROTECTED] writes: Russ Allbery [EMAIL PROTECTED] wrote: No, you still have to require that the connection between the web client and the web application server be encrypted. The thing that you're missing is that doing regular Kerberos involves a computational step

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Russ Allbery
experience with other protocols like e-mail, we're just not holding our breath. Having a protocol in place is one thing. Having a random PC be able to authenticate to web pages without installing additional software is quite another. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Russ Allbery
software installed and configured in order to even consider using browser SSO, No, they don't. I think you've missed how WebAuth works. It doesn't require any software on the client side whatsoever except for a browser that supports SSL and cookies. -- Russ Allbery ([EMAIL PROTECTED

Re: WebISO: the killer kerberos app?

2004-03-08 Thread Russ Allbery
, though. With WebAuth, you basically have to exit the browser when you're done to log out; nothing else is really safe or sufficient. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL

Re: WebISO: the killer kerberos app?

2004-03-09 Thread Russ Allbery
or TGT in order to obtain service tickets. Are you storing state on the login server, maybe? We had a requirement not to do that because we wanted to easily load-balance the login server. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Misbehaving krb5 forwarding?

2004-03-30 Thread Russ Allbery
see better behavior in this case. Cool, thanks. I didn't know if this was a known bug. We're hoping to move to 1.3.2 or 1.3.3, probably shortly after we finally manage to get a K5 aklog working, so *maybe* this summer, more likely later in the year. -- Russ Allbery ([EMAIL PROTECTED

Re: kerberos programming and ldap

2004-04-12 Thread Russ Allbery
was to standardize use of SASL to do authentication. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos

Re: kerberos programming and ldap

2004-04-14 Thread Russ Allbery
. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos

Re: Debug message compiled into libkrb5.a library?

2004-04-25 Thread Russ Allbery
. What are the actual undefined reference errors? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos

Re: GSS-API pointers

2004-04-27 Thread Russ Allbery
than Microsoft's are pretty experimental. See http://modauthkerb.sourceforge.net/; what you're looking for is the HTTP Negotiate authentication mechanism, which uses SPNEGO and GSSAPI. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: incompatibility between kerberos and openssl

2004-07-03 Thread Russ Allbery
CHANGES lists. are there any hints and tricks to do to avoid that incompatibility? Use the latest versions of both OpenSSL and Kerberos and you should be fine. This was fixed some time ago. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Bug in Kerberized telnet??

2004-07-06 Thread Russ Allbery
( \xff\xfb% ), as you see not written by me, that make the request fail. Trying with a non kerberized client to preform the same process I get a correct answer by the server. It looks like telnet is trying to do option negotiation even though the destination port isn't the telnet port. -- Russ

Re: only inetd?

2004-09-09 Thread Russ Allbery
is the ansawer?? It depends on what services you're talking about. If you're talking about klogind, telnetd, or the like, you have to run them through a service like inetd (xinetd, tcpserver, etc. would all work). -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Does Kerberos Encrypt Authentication AND Traffic?

2004-09-10 Thread Russ Allbery
context you're discussing these things in. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos

Re: Kerberos Authentication via Apache

2005-01-11 Thread Russ Allbery
is mod_auth_gss_krb5, available from: http://modgssapache.sourceforge.net/ -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo

Re: Six Kerberos/OS X/SSH observations and questions

2005-02-27 Thread Russ Allbery
services. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: KDC Failover

2005-04-06 Thread Russ Allbery
admin_server = krb5-admin.stanford.edu } for instance. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Porting k5start to Heimdal

2005-05-04 Thread Russ Allbery
need KTH Kerberos as well or need to hack on the Makefile a little bit; the next version will have a configure option to disable Kerberos v4 support. Also, any hints on how to do K5 error handling in a way that works with both Heimdal and MIT would be greatly appreciated. -- Russ Allbery ([EMAIL

Re: Porting k5start to Heimdal

2005-05-05 Thread Russ Allbery
this into the next release. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: A few questions about implementing a KDC for OpenAFS

2005-05-24 Thread Russ Allbery
K4 AFS protocol to do authentication, which definitely isn't the recommended configuration. If you use K5 for authentication, as is recommended, the clients need to talk directly to the KDC. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Programming in Kerberos

2005-06-27 Thread Russ Allbery
this, but alas it's still fairly common to have to send a Kerberos username/password pair over a TLS connection to be verified on the server. GSSAPI client support is slow to materialize. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Default ticket lifetime

2005-06-28 Thread Russ Allbery
this in the current krb5 distribution or any plans to implement something similar? default_lifetime in the [appdefaults] section, I believe. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list

Re: Default ticket lifetime

2005-06-28 Thread Russ Allbery
/krb5/krb/init_ctx.c). It looks like they might not have ever been really supported? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo

Re: Default ticket lifetime

2005-06-28 Thread Russ Allbery
); } That would be default_lifetime in [appdefaults]. Are you sure that you have the time specification syntax right? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos

Re: Default ticket lifetime

2005-06-28 Thread Russ Allbery
lifetime in krb5.conf. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: Default ticket lifetime

2005-06-28 Thread Russ Allbery
Ryan Underwood [EMAIL PROTECTED] writes: On Tue, Jun 28, 2005 at 09:51:47PM -0700, Russ Allbery wrote: Yup, looks like all that code has been significantly redone in 1.4. I agree, I don't see anything in 1.3.6 that would let you change the default ticket lifetime in krb5.conf

Re: Default ticket lifetime

2005-06-29 Thread Russ Allbery
Ryan Underwood [EMAIL PROTECTED] writes: On Tue, Jun 28, 2005 at 09:36:42PM -0700, Russ Allbery wrote: That would be default_lifetime in [appdefaults]. Are you sure that you have the time specification syntax right? Yeah, I just don't have the code you quoted in the 1.3.6 kinit.c

Re: Stash File

2005-07-02 Thread Russ Allbery
always recreate the stash file. Since the slave KDCs all have a copy of the stash file, one could also argue that the slave KDCs are backups of the stash file (and the database). -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Default ticket lifetime

2005-07-04 Thread Russ Allbery
Ryan Underwood [EMAIL PROTECTED] writes: On Wed, Jun 29, 2005 at 10:04:40AM -0700, Russ Allbery wrote: All that code to support appdefault configuration in kinit is a local modification, which is also why default_lifetime was working for us locally but isn't working for you. Hmm, so are you

Re: Need some tips on kerberizing our ENTIRE network

2005-07-05 Thread Russ Allbery
? No. You really do not want to have two password repositories that you have to keep in sync. You *can* get LDAP to refer its authentications to Kerberos, but my understanding is that this is not the fastest thing in the world to do. -- Russ Allbery ([EMAIL PROTECTED]) http

Re: Updating encryption types

2005-07-07 Thread Russ Allbery
] and the cross-realm trust was 2 admins ago - did they make a mistake, or is this a bug in kerb, or is this expected behavior? I would expect your krbtgt ticket to include your realm. Ours always has, and we haven't set up cross-realm trust. -- Russ Allbery ([EMAIL PROTECTED]) http

Re: krb5-1.4.1 build failure on FreeBSD 5.4 (EAI_NODATA), and a workaround

2005-07-11 Thread Russ Allbery
that EAI_NODATA is not listed as a valid return code in RFC 3493. This should be fixed in the krb5 source, but in the meantime the workaround would be to compile with -DEAI_NODATA=EAI_NONAME, which the code appears to deal with correctly. -- Russ Allbery ([EMAIL PROTECTED]) http

Re: krb5.conf ' # ' in realms section can cause ssh to segv

2005-07-13 Thread Russ Allbery
a NULL pointer. (There's also another problem with MIT K5 right now where it doesn't completely initialize an output_token buffer in the GSSAPI layer in some particular circumstances.) These are #1988 and #3086 in the MIT Kerberos RT. -- Russ Allbery ([EMAIL PROTECTED]) http

Re: krb5-1.4.1 runtime problem on FreeBSD 5.4

2005-07-15 Thread Russ Allbery
kinit and kadmin clients: Assertion failed: (k5int_i-did_run != 0), function krb5int_initialize_library, file krb5_libinit.c, line 60. Abort (core dumped) This smells like threading issues, but beyond that I'm afraid I can't really help. -- Russ Allbery ([EMAIL PROTECTED

Re: Problem building an API program against 1.4.1

2005-07-31 Thread Russ Allbery
as well. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: Problem building an API program against 1.4.1

2005-08-01 Thread Russ Allbery
. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: kinit issue

2005-08-30 Thread Russ Allbery
cache but instead create the ticket cache with mkstemp or a similar routine. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo

Re: kinit locking up

2005-12-10 Thread Russ Allbery
$ kinit Password for [EMAIL PROTECTED]: *hangs forever after password is entered* If you run kinit under strace, what is it doing after you enter your password? Nothing at all? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: kinit locking up

2005-12-10 Thread Russ Allbery
? It should work basically like kinit, but it's an independent implementation. That should isolate whether it's some sort of library problem or possibly a problem in kinit itself. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: kinit locking up

2005-12-13 Thread Russ Allbery
apt-get install valgrind and then run: valgrind kinit and it will spew out lots of memory debugging. You can use the --log-file option to specify a file to which the output should go instead. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: kinit locking up

2005-12-14 Thread Russ Allbery
==by 0x406E075: dereference (cc_file.c:1485) ==16877==by 0x406E2EE: krb5_fcc_close (cc_file.c:1503) ==16877==by 0x40701D3: krb5_cc_close (ccfns.c:61) ==16877==by 0x8049E3B: (within /usr/bin/kinit) ==16877==by 0x4100EAF: __libc_start_main (in /lib/tls/i686/cmov/libc-2.3.5.so) -- Russ

Re: ssh-gssapi fails when user have instance part

2005-12-14 Thread Russ Allbery
directory that lists jay/[EMAIL PROTECTED] as a principal authorized to log on to that account? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman

Re: kinit locking up

2005-12-15 Thread Russ Allbery
Jon DeVree [EMAIL PROTECTED] writes: On Wed, Dec 14, 2005 at 07:39:56PM -0800, Russ Allbery wrote: One thing that I did notice was a bunch of SASL calls earlier on. I think the invalid reads there are probably just the standard ld.so noise that doesn't appear to mean anything

Re: kinit locking up

2005-12-15 Thread Russ Allbery
Jon DeVree [EMAIL PROTECTED] writes: On Wed, Dec 14, 2005 at 11:02:50PM -0800, Russ Allbery wrote: Okay, getting closer. What SASL modules do you have installed? In particular, do you have any GSSAPI SASL modules installed? Just libsasl2 package because the ldap packages in Debian depend

Re: java 1.5 KINIT error

2005-12-15 Thread Russ Allbery
at: http://archives.java.sun.com/cgi-bin/wa?A2=ind0212L=java-securityF=S=P=802 in which case try the fix at: http://archives.java.sun.com/cgi-bin/wa?A2=ind0212L=java-securityD=0P=1130 -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Kerberos and LDAP to replace NIS

2005-12-20 Thread Russ Allbery
Kerberos? i tested telnet -F and rlogin -F and both works fine , i want to know how can i make authentcation done through kerberos for all login? Generally one uses a Kerberos PAM module. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: kinit uses libdefaults in krb5.conf instead of appdefaults

2005-12-22 Thread Russ Allbery
that, but it looks like the profile parser is going to be rewritten and I'm holding off a little on trying to beat those patches into place until I see if the profile API changes (since we had to change it in order to do some things properly). -- Russ Allbery ([EMAIL PROTECTED]) http

Re: Problem to have mod_auth_kerb to work

2006-01-13 Thread Russ Allbery
Smellyfrog [EMAIL PROTECTED] writes: [Fri Jan 13 12:57:16 2006] [debug] src/mod_auth_kerb.c(1023): [client 172.24.25.100] Acquiring creds for HTTP/[EMAIL PROTECTED] This looks wrong. Normally the instance of the HTTP/* principal must be a fully-qualified hostname. -- Russ Allbery ([EMAIL

Re: Thoughts on long-lived credentials

2006-01-22 Thread Russ Allbery
staring at the Heimdal kinit source for a while. Still, any corrections or further testing from Heimdal users is much appreciated. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos

Re: KRB5CCNAME and sshd

2006-01-28 Thread Russ Allbery
, but won't have time for a while. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: Can use kerberized telnet, but cannot use pam_krb5

2006-02-01 Thread Russ Allbery
that's really the problem. The verification step is probably a red herring; it will always fail if the authentication isn't being done as root, since it can't read the keytab file. I still need to take a closer look at it and see if I can at least improve the logging. -- Russ Allbery ([EMAIL

Re: Can't find libgcc after building 1.4.1

2006-02-14 Thread Russ Allbery
++ programs where you would care. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: KDC does not accept requests through loopback interface

2006-02-22 Thread Russ Allbery
run kinit or kadmin from the KDC, Why? Why don't kinit and kadmin use the same IP address as any other client when run from the KDC? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list

Re: Problem with kerberos and ssh.

2006-03-01 Thread Russ Allbery
for the MIT implementation. It exports all of the generic GSSAPI functions. It only has one underlying mechanism, but the MIT code is structured so that you could add additional ones. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: MIT KDC multiple admins for subsets of principals

2006-03-06 Thread Russ Allbery
inside kadmind so that users could follow standard web documentation for downloading keytabs without having to use Stanford-specific programs. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list

Re: Solaris ssh pam_krb

2006-03-28 Thread Russ Allbery
, right now, is going to be willing to do. That's changing slowly, but not yet for host/* principals. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https

Re: Solaris ssh pam_krb

2006-03-28 Thread Russ Allbery
this you're almost certainly running into: 6320871 kinit fails if default_tkt_enctypes = des-cbc-crc but princ has des-cbc-md5 and preauth required No, we're almost certainly not. :) Believe me, none of our principals have any des-cbc-md5 keys and never will. -- Russ Allbery ([EMAIL PROTECTED

Re: Solaris ssh pam_krb

2006-03-28 Thread Russ Allbery
:00 Last modified: Mon Mar 27 16:57:25 PST 2006 (service/[EMAIL PROTECTED]) Last successful authentication: [never] Last failed authentication: [never] Failed password attempts: 0 Number of keys: 1 Key: vno 5, DES cbc mode with CRC-32, no salt Attributes: Policy: [none] -- Russ Allbery ([EMAIL

Re: Solaris ssh pam_krb

2006-03-29 Thread Russ Allbery
that are happy. Ditching single DES in K5 is scheduled for some time after turning off K4, so it's going to be a bit yet. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu

Re: Write a keytab?

2006-04-10 Thread Russ Allbery
into it with a 0.7 release. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: .k5login and non-kerberized ssh client

2006-04-24 Thread Russ Allbery
in the .k5login file both happen to have the same password, but I don't consider those weird things to be true security vulnerabilities. Anything that happens with this module could be done intentionally without it.) -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Presence/absence of the keytab

2006-05-05 Thread Russ Allbery
the host keytab to use for verification, and I don't know of any PAM module that is configurable enough to be pointed at any keytab and use that keytab for verification. It would be a good thing to add, though. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Presence/absence of the keytab

2006-05-06 Thread Russ Allbery
, I can modify Debian's libpam-krb5 to use that approach instead (since it looks like I'm going to end up being the upstream maintainer of that fork of the code anyway since we need it at Stanford and I need to add and fix a bunch of bits in it anyway). -- Russ Allbery ([EMAIL PROTECTED

Re: Licensing question

2006-06-08 Thread Russ Allbery
? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: keytab created on MIT KDC with des3 enctype does not work with heimdal

2006-06-08 Thread Russ Allbery
the code I found that it is failing in verify_checksum function. Read the COMPATIBILITY section of the gssapi(3) man page. Could that be your problem? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list

Re: Kerberos + SSH question

2006-06-25 Thread Russ Allbery
Sebastian Hanigk [EMAIL PROTECTED] writes: If one runs NIS on the network, I believe there is the possibility of switching to Kerberos for authentication while still using NIS for the name services. Yup, we did this for years before switching to LDAP. -- Russ Allbery ([EMAIL PROTECTED

Re: kadmin command line history/editing

2006-06-25 Thread Russ Allbery
, which comes from e2fsprogs and looks like it attempts to load a readline-compatible library dynamically at runtime. The one that comes with MIT Kerberos is older and doesn't look like it includes that support. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: [modauthkerb] mod_auth_kerb, virtualhost and Firefox/Safari

2006-06-27 Thread Russ Allbery
ago but never acted on by MIT. as far as I know. Aha! So this doesn't work currently with MIT Kerberos but would if your patch were applied? Am I reading your message correctly? Is this patch already in RT? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: [modauthkerb] mod_auth_kerb, virtualhost and Firefox/Safari

2006-07-05 Thread Russ Allbery
it be significantly simplified. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: keytab wrecks login

2006-07-12 Thread Russ Allbery
: +.BR addent . +.TP .BR list_requests Displays a listing of available commands. Aliases: .BR lr , -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https

remctl 2.0 released

2006-08-11 Thread Russ Allbery
creation, and just about every other remote command execution purpose that you can think of. Note, though, that we've not yet deployed remctl 2.0 widely, so this version isn't as heavily tested as previous versions (yet). -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: PAM hangs after authenticating against 2003 AD

2006-08-11 Thread Russ Allbery
that the principal didn't exist in the KDC. In other words, I would suspect either an outdated keytab file or a keytab file for some realm other than the system's default realm. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle

Re: Creation of principal without password

2006-08-17 Thread Russ Allbery
). -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Changing the database master key

2006-08-31 Thread Russ Allbery
. 2. Dump the old database using -new_mkey_file pointing at the new stash. 3. Load the database dump into the new empty database. and thereby change the database master key. Is that correct? Does this fail for some reason? Has anyone done this? -- Russ Allbery ([EMAIL PROTECTED

Ticket enctype question

2006-08-31 Thread Russ Allbery
was that that was not supposed to affect the bits on the wire. Is my understanding incorrect? -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: Ticket enctype question

2006-08-31 Thread Russ Allbery
. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

Re: Reason for 2 branches krb5-1.4.x krb5-1.5.x?

2006-09-01 Thread Russ Allbery
version would be more practical and *transparent* to upgrade to? considering we still have to provide support krb524. My gut says 1.4.4, so... At least right now, I'd recommend 1.4.4. I expect that will probably change in six months or so. -- Russ Allbery ([EMAIL PROTECTED]) http

pam-krb5 2.3 released

2006-09-03 Thread Russ Allbery
it. -- Russ Allbery ([EMAIL PROTECTED]) http://www.eyrie.org/~eagle/ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos

  1   2   3   4   5   6   7   8   9   >